Closed Bug 1867898 Opened 2 years ago Closed 1 year ago

Utility processes on Linux should use namespace/chroot sandboxing where possible

Categories

(Core :: Security: Process Sandboxing, defect, P2)

defect

Tracking

()

RESOLVED FIXED
128 Branch
Tracking Status
firefox-esr115 --- wontfix
firefox126 --- wontfix
firefox127 --- wontfix
firefox128 --- fixed

People

(Reporter: jld, Assigned: gerard-majax)

References

Details

(Keywords: sec-other, Whiteboard: [adv-main128-])

Attachments

(1 file)

Currently, utility processes will use a seccomp-bpf sandbox, but will not attempt to unshare namespaces or chroot to a nonexistent directory for more isolation (if the OS allows us, which most distributions now do by default). We do this for most other child processes but it's not yet enabled for utility processes.

I should have caught this during review in bug 1731890, because the change to GetEffectiveSandboxLevel doesn't do anything without a change to its caller to use the return value in that case; my apologies for missing it.

I don't think this is really a security vulnerability, because we don't require the OS to allow unprivileged namespaces at all, and we generally try to make the seccomp-bpf policy stand alone as a sandbox. But this does mean that the utility sandbox, as commonly deployed, isn't as strong as may have been expected, so I'm hiding this out of an abundance of caution to get a second opinion.

Group: core-security → dom-core-security
Keywords: sec-other
Assignee: nobody → lissyx+mozillians
Severity: -- → S3
Priority: -- → P2
Attachment #9367583 - Attachment description: Bug 1867898 - Force chroot and newpic for Utility r?jld! → Bug 1867898 - Use more clone() flags for Utility r?jld!
Pushed by alissy@mozilla.com: https://hg.mozilla.org/integration/autoland/rev/00327c4fd622 Use more clone() flags for Utility r=gcp
Group: dom-core-security → core-security-release
Status: NEW → RESOLVED
Closed: 1 year ago
Resolution: --- → FIXED
Target Milestone: --- → 128 Branch
QA Whiteboard: [post-critsmash-triage]
Flags: qe-verify-
Whiteboard: [adv-main128-]
Group: core-security-release
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: